Closed Loop Security White Papers

(View All Report Types)
Strategies for successfully managing privileged accounts
sponsored by One Identity
WHITE PAPER: One of the most important aspects of an identity security program is the management and governance of the accounts belonging to superusers — privileged accounts.
Posted: 12 Jun 2024 | Published: 12 Jun 2024

TOPICS:  Security
One Identity

Integrated Solutions for Defect and Project Tracking
sponsored by TechExcel
WHITE PAPER: This paper describes the unique approach and conceptual model that has made DevTrack a clear leader in today's competitive defect tracking market.
Posted: 05 Jun 2008 | Published: 05 Jun 2008

TechExcel

Efficient Installation and Operation of Terminal Server Farms
sponsored by visionapp
WHITE PAPER: This whitepaper describes some of the potential issues that may be encountered with the installation and operation of terminal servers and explains straightforward ways to resolve them.
Posted: 09 May 2008 | Published: 01 Sep 2005

visionapp

Managing Risk in Outsourced Manufacturing
sponsored by E2open
WHITE PAPER: This white paper looks at some of the management risks and challenges associated with outsourced manufacturing strategies and summarizes the proven ways used by companies that have successfully resolved or mitigated these risks.
Posted: 05 Dec 2008 | Published: 05 Dec 2008

E2open

Productivity, Internet Abuse, and How to Improve One by Eliminating the Other
sponsored by Bloxx, Inc.
WHITE PAPER: This white paper explains the effect of Internet abuse on employee productivity, which is huge and not fully appreciated.
Posted: 05 Sep 2008 | Published: 05 Sep 2008

Bloxx, Inc.

Facilitating Enterprise PCI DSS Compliance - Detail Review
sponsored by Globalscape
WHITE PAPER: HS-PCI solution helps procedure and policy enforcement by monitoring and reporting on PCI DSS compliance by using prompts and warnings.
Posted: 16 Apr 2008 | Published: 15 Apr 2008

Globalscape

The Realities of Single Sign-On
sponsored by PistolStar, Inc.
WHITE PAPER: Single Sign-On has emerged as a significant technology that resolves a major issue for organizations with multiple platforms, servers and applications requiring unique usernames and passwords for access.
Posted: 13 Jun 2008 | Published: 01 Jan 2006

PistolStar, Inc.

Media Conversion in Video Security and Surveillance Systems
sponsored by Transition Networks, Inc.
WHITE PAPER: This whitepaper discusses what can be the weakest link in many video applications – cabling infrastructure. Learn how media conversion can be an economical and effective means to convert to the cabling medium of your choice.
Posted: 04 Sep 2008 | Published: 04 Sep 2008

Transition Networks, Inc.

Web Services Security: What's Required to Secure a Service-Oriented Architecture
sponsored by Oracle Corporation
WHITE PAPER: This white paper details a holistic approach for Service Orientated Architecture (SOA) security using additional, application-level industry standards to secure web services and multi-step transactions in a SOA environment.
Posted: 16 Mar 2009 | Published: 01 Jan 2008

Oracle Corporation

Web Based Attacks
sponsored by Symantec Corporation
WHITE PAPER: This report describes the anatomy of web based attacks and examines some of the factors that have influenced a shift toward this type of attack over the last year.
Posted: 11 Jun 2009 | Published: 01 Feb 2009

Symantec Corporation