Blocking Software White Papers

(View All Report Types)
Managing Instant Messaging For Business Advantage: Phase One - Assessing IM Usage
sponsored by Symantec Corporation
WHITE PAPER: Instant Messaging (IM) is a valuable business communications tool for your company but its widespread adoption brings the risk of potential worms and viruses. This paper examines seven steps for managing, securing, and auditing your company's use of IM.
Posted: 17 May 2006 | Published: 01 Mar 2006

Symantec Corporation

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities
sponsored by Imperva.
WHITE PAPER: This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten database vulnerabilities as identified by Imperva's Application Defense Center.
Posted: 29 Nov 2013 | Published: 08 Oct 2008

Imperva.

Patch Management 2.0: Evolving Your Patch Management Technology to Proactively Combat Security Challenges
sponsored by Lumension
WHITE PAPER: Read this white paper to get up-to-date technology alternatives to help better manage your patch management environment.
Posted: 10 Jun 2008 | Published: 01 Jun 2008

Lumension

Requirements Definition as the Foundation for Effective Software Delivery
sponsored by IBM
WHITE PAPER: This white paper examines the challenges that impede teams as they try to collect, analyze, and evaluate ideas to define the best solution requirements. The paper also provides information on the four critical areas to defining great requirements and how IBM Rational® solutions help teams address these areas.
Posted: 16 Mar 2009 | Published: 13 Mar 2009

IBM

Integrated Change and Release Management: A Defect Resolution Use-case Scenario
sponsored by IBM Software Group
WHITE PAPER: This paper introduces the IBM Rational change and release management solution to help companies streamline and accelerate their software and systems delivery lifecycle.
Posted: 15 Feb 2008 | Published: 01 Oct 2007

IBM Software Group

The Complete Network Assessment
sponsored by Dorado Software
WHITE PAPER: This paper gives a brief overview on how a complete network inventory assessment can improve the health & security of network.
Posted: 19 Nov 2008 | Published: 19 Nov 2008

Dorado Software

Pod Slurping - An Easy Technique for Stealing Data
sponsored by GFI Software
WHITE PAPER: In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as 'pod slurping', can lead to major security breaches.
Posted: 18 Sep 2006 | Published: 18 Sep 2006

GFI Software

Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by Logicalis
WHITE PAPER: This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 11 Dec 2008 | Published: 11 Dec 2008

Logicalis

Security Threat Report: July 2008
sponsored by Sophos
WHITE PAPER: This report gives a comprehensive insight into the events and trends that emerged during the first half of 2008, and helps businesses to stay ahead of today's increasingly covert threats.
Posted: 13 Nov 2008 | Published: 13 Nov 2008

Sophos

Increasing Data Center Density While Driving down Power and Cooling Costs
sponsored by Intel Corporation
WHITE PAPER: This paper discusses various technologies that can help IT managers plan and implement a more comprehensive and effective strategy for expanding data center capabilities while reducing power consumption.
Posted: 24 Jul 2008 | Published: 01 Jun 2006

Intel Corporation