Stopping data leakage: Exploiting your existing security investment
sponsored by Sophos
WHITE PAPER:
This paper gives practical guidance on how to use current investments in IT security technologies at the gateway and endpoint to support a high-profile acceptable use policy for data leakage prevention, and describes where new investments should be made.
Posted: 01 Oct 2008 | Published: 01 Jun 2008
|
|
|
Windows Essential Business Server 2008: Deploying Windows Mobile 6 with Windows Essential Business Server 2008
sponsored by Microsoft
WHITE PAPER:
This document provides step-by-step instructions for deploying devices powered with Windows Mobile 6 in an IT infrastructure that is based on the Windows Essential Business Server 2008 (Windows EBS 2008) server solution.
Posted: 05 Dec 2008 | Published: 05 Dec 2008
|
|
|
Configuration Audit and Control: 10 Critical Factors to Change and Configuration Management Success
sponsored by Tripwire, Inc.
WHITE PAPER:
As businesses have instituted internal, industry, and government mandated regulatory compliance, the need for audit data to prove conformity has also become a necessity. Read this white paper to learn how configuration audit and control provides a single, independent source for enforcing and reporting on a change policy across an organization.
Posted: 14 Oct 2008 | Published: 14 Oct 2008
|
|
|
Multilayer Security: Enabling a Sustainable Alternative to Paper-Based Customer Communications
sponsored by VeriSign EMEA
WHITE PAPER:
A multilayer security approach delivers the end-to-end solution needed to comprehensively target various security issues.
Posted: 04 Dec 2008 | Published: 13 Nov 2008
|
|
|
Securing Business Communications Applications in Converged Networks - Best Practices
sponsored by Avaya Inc.
WHITE PAPER:
Converged networks require converged security that expands traditional data security practices to protect the privacy of all network information, including IP telephony traffic.
Posted: 10 Jun 2008 | Published: 01 Jul 2005
|
|
|
The New Information Agenda: Do You Have One?
sponsored by IBM
WHITE PAPER:
This white paper defines the information agenda; describes key considerations and best practices in creating and implementing an information agenda.
Posted: 14 May 2008 | Published: 01 Jan 2008
|
|
|
Hitachi IT Operations Analyzer: Root Cause Analysis for Supporting Fault Identification
sponsored by Hitachi Vantara
WHITE PAPER:
Hitachi Data Systems introduces Hitachi IT Operations Analyzer software with unique Root Cause Analysis functionality. The IT Operations Analyzer is a powerful, proven approach to simplifying IT infrastructure management, with comprehensive performance and availability monitoring of up to 250 server, network and storage nodes.
Posted: 04 Jun 2009 | Published: 01 May 2009
|
|
|
IDC White Paper: Key Criteria in Selecting an Enterprise Online PC Backup Solution
sponsored by Iron Mountain
WHITE PAPER:
This paper illustrates the top–level benefits of online PC backup. Read this paper to learn more about how to choose an online PC backup solution for your mid-sized organization or enterprise!
Posted: 11 Jan 2010 | Published: 15 Dec 2008
|
|
|
Top Reasons to Upgrade to Symantec Backup Exec™ 12.5 and Backup Exec System Recovery 8.5
sponsored by Symantec Corporation
WHITE PAPER:
Download this whitepaper to find out the top reasons to upgrade to a more effective backup system and how to get continuous data protection and complete system recovery.
Posted: 02 Oct 2008 | Published: 02 Oct 2008
|
|
|
When Less Is More: Why Small Companies Should Think Outside the (Red/ Yellow) Box for Protecting Endpoints
sponsored by Sunbelt Software
WHITE PAPER:
Endpoint security issues simply can't be ignored, regardless of the size of the organization. This paper will discuss how internet threats and vulnerabilities affect us all and what criteria businesses should use in order to pick out a proper endpoint security solution.
Posted: 30 Jul 2009 | Published: 30 Jul 2009
|
|