Assessing Risk White Papers

(View All Report Types)
Automated Penetration Testing; Can IT Afford Not To?
sponsored by Core Security Technologies
WHITE PAPER: This paper contains an overview of penetration testing, a summary of vulnerabilities that can be revealed through penetration testing, and the business and technical benefits of performing penetration testing across your infrastructure.
Posted: 18 Jan 2007 | Published: 01 Jan 2007

Core Security Technologies

IBM System x Servers - The Right Choice. Open. Easy. Green
sponsored by IBM
WHITE PAPER: IBMSystemx is a portfolio of robust servers built on IBMX-Architecture's our blueprint for bringing innovation tox86systems. Innovation that helps set you apart from the competition. Learn more in this paper.
Posted: 11 Sep 2008 | Published: 11 Sep 2008

IBM

Extend Business Reach with a Robust Security Infrastructure
sponsored by IBM Software Group
WHITE PAPER: This white paper discusses the advantages of a security management solution designed to deliver integrated, comprehensive solutions across a heterogeneous environment.
Posted: 03 Aug 2007 | Published: 01 Jul 2007

IBM Software Group

A Comprehensive Best Practice Approach to Business Resilience and Risk Mitigation
sponsored by IBM
WHITE PAPER: This white paper serves as a comprehensive, best-practices approach to business resilience and risk mitigation. Common types of risk and the steps organizations must take to develop an effective risk mitigation strategy are discussed.
Posted: 29 May 2008 | Published: 01 Sep 2007

IBM

The Financial Close: Optimizing Performance and Driving Financial Excellence
sponsored by SAP America, Inc.
WHITE PAPER: The term "financial close" describes a corporation's ability to complete its accounting cycles and produce financial statements for internal management and external legal reporting. This paper identifies solutions to help organizations improve and sustain their close times and address the challenges associated with automating internal controls
Posted: 05 Jun 2009 | Published: 02 Jun 2009

SAP America, Inc.

Protecting Credit Card Data: How to Achieve PCI Compliance
sponsored by Motorola Solutions
WHITE PAPER: This white paper details the best way to achieve compliance by building a complete end-to-end PCI-capable solution.
Posted: 20 Jun 2008 | Published: 01 Jul 2007

Motorola Solutions

3 Key Components of a Risk-Based Security Plan
sponsored by Foundstone, Inc.
WHITE PAPER: This whitepaper takes a look at the different components of an effective security plan, and provides a perspective on how enterprises that are serious about their information security budgets should rethink their security plan.
Posted: 02 Jun 2008 | Published: 02 Jun 2008

Foundstone, Inc.

Stratecast: An SSL VPN Selection Framework: One Size Does Not Fit All
sponsored by SonicWALL
WHITE PAPER: SSL VPN is an important layer of protection for your company. This paper details an SSL VPN selection framework to help you evaluate the best option for your organization and how to save time and money when selecting your next SSL VPN.
Posted: 14 Nov 2007 | Published: 01 Nov 2007

SonicWALL

Acquire a global view of your organization's security state: the importance of security assessments
sponsored by IBM Software Group
WHITE PAPER: Security assessments from IBM can help find "point-in-time" or ongoing security gaps in data confidentiality, integrity and accessibility as well as prior breaches and budgetary justification for making necessary security investments.
Posted: 09 Jan 2008 | Published: 09 Jan 2008

IBM Software Group

SAP Upgrade Assessment: Mitigating Risk of Upgrade Projects
sponsored by HCL Software
WHITE PAPER: This white paper examines the challenges and risks associated with SAP Upgrades and analyze how a SAP Upgrade Assessment could be used as a risk mitigation tool.
Posted: 20 Jun 2008 | Published: 13 Mar 2008

HCL Software